Enterprise Linux Security Advisory ELSA-2008-0164
https://rhn.redhat.com/errata/RHSA-2008-0164.html
The following updated rpms for Enterprise Linux 5 have been uploaded to
the Unbreakable Linux Network:
i386:
krb5-devel-1.6.1-17.el5_1.1.i386.rpm
krb5-libs-1.6.1-17.el5_1.1.i386.rpm
krb5-server-1.6.1-17.el5_1.1.i386.rpm
krb5-workstation-1.6.1-17.el5_1.1.i386.rpm
x86_64:
krb5-devel-1.6.1-17.el5_1.1.i386.rpm
krb5-devel-1.6.1-17.el5_1.1.x86_64.rpm
krb5-libs-1.6.1-17.el5_1.1.i386.rpm
krb5-libs-1.6.1-17.el5_1.1.x86_64.rpm
krb5-server-1.6.1-17.el5_1.1.x86_64.rpm
krb5-workstation-1.6.1-17.el5_1.1.x86_64.rpm
SRPMS:
http://oss.oracle.com/el5/SRPMS-updates/krb5-1.6.1-17.el5_1.1.src.rpm
Description of changes:
[1.6.1-17.el5_1.1]
- add preliminary patch to fix use of uninitialized pointer / double-free in
KDC (CVE-2008-0062,CVE-2008-0063) (#432620, #432621)
- add backported patch to fix use-after-free in libgssapi_krb5
(CVE-2007-5901)
(#415321)
- add backported patch to fix double-free in libgssapi_krb5 (CVE-2007-5971)
(#415351)
- add preliminary patch to fix incorrect handling of high-numbered
descriptors
in the RPC library (CVE-2008-0947) (#433596)
- fix storage of delegated krb5 credentials when they've been wrapped up in
spnego (#436460)
- return a delegated credential handle even if the application didn't pass a
location to store the flags which would be used to indicate that
credentials
were delegated (#436465)
- add patch to fall back to TCP kpasswd servers for kdc-unreachable,
can't-resolve-server, and response-too-big errors (#436467)
- use the right sequence numbers when generating password-set/change
requests
for kpasswd servers after the first one (#436468)
- backport from 1.6.3 to initialize a library-allocated get_init_creds_opt
structure the same way we would one which was allocated by the calling
application, to restore kinit's traditional behavior of doing a password
change right when it detects an expired password (#436470)